Privacy-preserving distributed k-anonymity

被引:0
|
作者
Jiang, W [1 ]
Clifton, C [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
k-anonymity; privacy; security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous data, the model has been that of a single source wanting to publish data. This paper presents a k-anonymity protocol when the data is vertically partitioned between sites. A key contribution is a proof that the protocol preserves k-anonymity between the sites: While one site may have individually identifiable data, it learns nothing that violates k-anonymity with respect to the data at the other site. This is a fundamentally different distributed privacy definition than that of Secure Multiparty Computation, and it provides a better match with both ethical and legal views of privacy.
引用
收藏
页码:166 / 177
页数:12
相关论文
共 50 条
  • [1] A Privacy-preserving Computation Offloading Method Based on k-Anonymity
    Zhao Xing
    Peng Jianhua
    You Wei
    Chen Lu
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (04) : 892 - 899
  • [2] (k, ε, δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy
    Tsou, Yao-Tung
    Alraja, Mansour Naser
    Chen, Li-Sheng
    Chang, Yu-Hsiang
    Hu, Yung-Li
    Huang, Yennun
    Yu, Chia-Mu
    Tsai, Pei-Yuan
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (03) : 175 - 185
  • [3] K-Anonymity Based Approach For Privacy-Preserving Web Service Selection
    Ammar, Nariman
    Malik, Zaki
    Medjahed, Brahim
    Alodib, Mohammed
    2015 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2015, : 281 - 288
  • [4] A k-anonymity privacy-preserving approach in wireless medical monitoring environments
    Belsis, Petros
    Pantziou, Grammati
    PERSONAL AND UBIQUITOUS COMPUTING, 2014, 18 (01) : 61 - 74
  • [5] Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing
    Liu, Peng
    Bai, Yan
    Wang, Lie
    Li, Xianxian
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2017, 27 (01) : 71 - 90
  • [6] Trajectory Privacy-Preserving Approach for Consecutive Queries Based on K-Anonymity
    Zhu, Lin
    FUZZY SYSTEMS AND DATA MINING III (FSDM 2017), 2017, 299 : 416 - 421
  • [7] A k-anonymity privacy-preserving approach in wireless medical monitoring environments
    Petros Belsis
    Grammati Pantziou
    Personal and Ubiquitous Computing, 2014, 18 : 61 - 74
  • [8] K-anonymity privacy-preserving data sharing for a dynamic game scheme
    Cao, Laicheng
    Hou, Yangning
    Feng, Tao
    Guo, Xian
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (04): : 170 - 179
  • [9] A Clustering K-Anonymity Privacy-Preserving Method for Wearable IoT Devices
    Liu, Fang
    Li, Tong
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [10] A personalized k-anonymity privacy preserving method
    Xu, Yong
    Qin, Xiaolin
    Yang, Zhongxue
    Yang, Yitao
    Li, Kun
    Journal of Information and Computational Science, 2013, 10 (01): : 139 - 155